SlideShare a Scribd company logo
International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 4 (July-August 2015), PP. 41-43
41 | P a g e
IMPLEMENTATION OF METHODS FOR
TRANSACTION IN SECURE ONLINE BANKING
Kashif Ruman, Dr H.D. Phaneendra
P.G Student: I.S.E Dept., Professor.,CS&E Dept.,
National Institute of Engineering,
Mysore, India.
Kruman364@gmail.com, hdphanee@yahoo.com
ABSTRACT- Security is a concept similar to being cautious
or alert against any danger. Network security is the condition of
being protected against any danger or loss. Thus safety plays a
important role in bank transactions where disclosure of any data
results in big loss. We can define networking as the combination
of two or more computers for the purpose of resource sharing.
Resources here include files, database, emails etc. It is the
protection of these resources from unauthorized users that
brought the development of network security. It is a measure
incorporated to protect data during their transmission and also
to ensure the transmitted is protected and authentic.
Security of online bank transactions here has been
improved by increasing the number of bits while establishing the
SSL connection as well as in RSA asymmetric key encryption
along with SHA1 used for digital signature to authenticate the
user.
Keywords—Network Security, Digital signature, RSA,
Security Attacks, Encryption, Certificate.
I. INTRODUCTION
Network can been defined as any set of interlinking lines
resembling a network of roads parallel and interconnected
system, also computer network can be simply defined as a
system of interconnected computers. Security can be defined
as the need to protect one or more aspects of network‘s
operation and its permitted use for e.g. accessing, checking
behavior, performance, having privacy and confidentiality.
Network Security requirements can be Local or Global
accordingly to their scope, depending upon the networks or
purpose of design and deployment. The important aspect in
judging security solutions include ability to meet the specified
things, computing resources needed, quality, sustainability and
economic considerations.
Security Attacks compromises the data security. Active
attacks can be defined as active attempts made to alter the data
on security leading to modification, redirection, or destruction
of data, systems or links. Another type of attack is Passive
attacks which involve simply getting access to link of device
and obtain data. Security threats can be defined as the threats
that have the potential for violating security rules. Security
Mechanism is a mechanism that detects/ locates/
identifies/prevents/ recovers from various security attacks. We
should have a Security Service that improves security and
makes use of the security mechanisms.
The Internet is an integral part of our daily routines, and
the proportion of people who expect to be able to manage their
banking accounts anywhere, anytime is constantly increasing.
So due to this enormous growth of online transactions Internet
banking has become a very crucial and important component
of any financial institution‘s strategy. Information about
financial institutions, their users, and their fund transactions is,
by necessity, extremely sensitive. So the Internet banking
system should have provision to solve the issues related to
authentication and non-repudiation, so that only authorized
people can access an Internet banking account, and the
information viewed must remain private and it should not be
modified by others. For confidentiality and integrity, we have
Secure Sockets Layer which has been defined as the defacto
Internet banking standard, and for authentication and non-
repudiation, no good scheme has become predominant yet.
II. LITERATURE SURVEY
Networking can be defined as the creating a group of
acquaintances and associates and keeping it active through
regular communication for mutual benefit. We can simply say
that networking relies on the question "How can I help?" and
not with "What can lI achieve from it?" .It provides the
protection of the resources from unknown users, which
brought the development of network security.
It can be said as procedure put in place to protect data
during their transmission and also to ensure the transmitted is
protected and authentic. A threat can be defined in many ways
such as gaining access to the network by an unauthorized
party, to better understand the various types of threats to
security; the definition of security requirement is inevitable.
A. Cryptography and different Types of Security
Algorithms
Cryptography can be defined as science of writing in
secret code. Between the contexts of any process to process
communication, involves some of the specific security
requirements like:
 Authentication: It is the process of finding the identity of
the user who is genuine and has access to resources.
 Confidentiality: Ensuring that no other is able to access
the data except the authorized user
 Integrity: Assuring the reception that the message
obtained has not been changed or tampered in any
circumstances from the original.
 Non-repudiation: A process to prove that the
sender/receiver has really sent/received this message.
There are several different ways of classifying cryptographic
techniques. The algorithms can be majorly classified in 3
ways:
 Secret Key Cryptography (SKC): In this type of algorithm
it uses a common key for encryption and decryption at the
sender and receiver end respectively.
 Public Key Cryptography (PKC): In this type of algorithm
it uses different key for encryption and another key for
decryption at the sender and receiver end respectively.
 Hash Functions: In this type of algorithm uses a
mathematical transformation techniques to irreversibly
"encrypt" the data.
International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 4 (July-August 2015), PP. 41-43
42 | P a g e
B. Digital Signature Using RSA
In the RSA algorithm for digital signature process, we
have the private key that is used to encrypt only the plain text.
Then encrypted message becomes the digital signature and is
attached to the original data contained.
C. Security Attacks
Security attacks on network can be classified in terms of
passive and active attacks. In case of passive attack it access
the information from the system, but doesn‘t harm the
information or resource in the system. An active attack on the
other side will make changes in the system and diverts the
ongoing operation.
A passive attack is a network attack in which a system is
monitored and sometimes scanned for open ports and
vulnerabilities. The main aim is to gain information about the
target and no data is changed on the target.
An active attack, hacker is attempting to break into the
system. During the attack, the intruder will introduce data into
the system as well as potentially change data within the
system.
D. SHA (Secured Hash Algorithm)
SHA the is cryptographic hash function. The different
algorithms of SHA are SHA 0, SHA 1, SHA 2, and SHA 3.
Here SHA-0 is the original version of the 160-bit hash
function under the name "SHA", SHA-1 can be termed as, it is
very much similar to SHA-0, but changes has been
incorporated where it alters the original SHA hash
specification to overcome its drawbacks, and SHA-2 was
published in 2001, and this algorithm is very much different
from the SHA-1 hash function.
The most widely used algorithm is SHA-1 compared to all
other existing SHA hash functions, and is employed in several
widely used applications and protocols.
III. SYSTEM REQUIREMENTS AND SPECIFICATION
It provides a description of the various factors that affect
the system and its requirements.
A. System Perspective
The secure system is aimed towards providing a service to
users to trust servers before any request can made, and various
methods have been implemented to detect fake servers and
alert users about such systems and carry out communication in
a secure manner.
B. System Function
The primary function of the system is to issue a certificate
first to registered servers based on some credentials (like IP
address, port number, kind of service being offered by server
etc.) For obtaining this, the server has to interact with CA
(Certificate Authority). Here the assumption is that CA is
legitimate and fully trusted. User requests server for a
certificate before trusting it and later verifies it for its
authentication. In case of fake certificate detected, it is
immediately reported to CA.
C. Functional Requirements
Functional requirements are those that refer to the
functionality of the system. That is, what services it will
provide to the client. Nonfunctional or supplementary
requirements pertain to other information needed to produce
the correct system and are detailed separately.
 User has to request Server for Certificate and Public Key
of CA after registration with server
 User has to request Server for Certificate and Public Key
of CA after registration with server.
 User tries to detect whether Server or CA communicating
with it is fake.
 User communicates with Server or CA in highly secured
manner.
 Server provides a service to Users to do online secure
transactions.
IV. SYSTEM ANALYSIS
The task of system analysis is to identify limitations of the
existing system and to establish in detail what the proposed
system will do. The main aim of the system analysis phase is
the specification of what the system needs to do to meet the
requirements of end users.
A. Existing System
The main aim of secure socket layer is to provide security
between server and client, which includes the confidentiality
that is the data should be kept secret, provide message
integrity means the message should not be altered, and
authentication where only authorized user have provision to
access the data. SSL obtains these type of security by using
encryption, digital signatures and certificates.
The sensitive and confidential information such as pin
number, social security numbers, and other important
credentials are protected by using cryptography. Confidential
data is encrypted with various different mechanisms across
public networks to obtain the confidentiality if not an
unauthorized user will able to obtain all the necessary data that
is being sent between a server and a client they can see and use
that information. Here the SSL protocol obtain the details of
the encryption for network as it will be able to track where the
data is being transmitted. The existing system uses SSL
communication with 128 bits & RSA Encryption with 1024
bits maximum.
Drawbacks of the existing system
1. Lesser the number of bits, more vulnerable to attack
2. Susceptible to collision attack
B. Proposed System
The project system architecture is shown below. Client
interacts with server and gets required service. Certificate
authority issues certificate to the server. The server‘s
certificate will be later verified by the client before any
transaction is being done and by the certificate authority upon
requisition by the client.
Features
1. SSL communication with 256 bits
2. RSA encryption with 2048 bits (this improvement in
RSA provides more security to personal data)
In this paper, as the result of analysis of existing system
unique secret key extraction from the received request based
on the inspiration of RSS in base paper is made possible. Once
the key obtained is unique and different private
communication secured for maximum by defeating the
intention of the intruder in knowing the secret key.
International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 4 (July-August 2015), PP. 41-43
43 | P a g e
V. SYSTEM DESIGN
This gives overall flow of the project and algorithm used
in the design.So in this phase Implementation can be said as a
stage in software development where the software design is
realized. The objects that are identified in the design stage are
implemented, and a function which manipulates these objects
is realized.
A. Structure Chart
Here the project is divided into three modules and sub-
modules of each module are shown in the Fig 1.
Fig 1 Structure chart
Registration Module: User should be registered with the
bank server and bank server should register with the
Certificate Authority before requesting for any kind of service.
Certificate Generation and Verification: User and
Certificate Authority verifies the certificate (i.e. whether the
that the given certificate is genuine or fake)
Secure Transaction: Here we carry out the transaction that is
secure communication between the entities.
Delay & Fake IP: To detect whether Server / CA is legitimate
or fake, detection of delay being introduced during
transmission due to fake node(s) in the network.
B. Sequence Diagram
Fig 2.Sequence diagram
As shown in the above fig 2, server first gets the
certificate from the server. Client sends a hello packet to the
server and server in turn sends the public key and certificate
issued by CA. Client verifies certificate with the help of CA
before trusting the server. When it is completely sure that
server is not fake, client proceeds to carry out a transaction in
a secure manner.
VI. CONCLUSION AND FUTURE ENHANCEMENTS
A. Conclusion
In this paper we analyzed various security threats for
computer networking, various loop holes of present
networking. These threats overcame by various methodologies
for securing the network through cryptography and encryption.
Effort was made to find out the security aspect of Networking
and it was overcome by means of Cryptography and
Encryption by using improved RSA algorithm and also
increased number of bits in SSL connection.
Even though key generation time is more compared to that
of present situation, security can be guaranteed which is more
important than key generation time in the current scenario.
B. Future Enhancements
Presently, the system will support two rounds of
certificate. In future it can be increased. The various types of
attacks can be detected in future. Different methods can be
adopted as a measure of security attack.
Greater level of security can be provided by using
multiple encryption, following multiple levels for an
authentication or by strengthening the encryption key by
increasing the number of bits.
REFERENCES
[1]. Christos K. Dimitriadis, ‖Analyzing the Security of Internet
Banking Authentication Mechanisms‖2007 ISACA
[2]. S.R. Subramanya and byung K. YI ‖Digital signatures‖, IEEE
March/April 2006.
[3]. Weeks, Stephen. Understanding Trust Management Systems.
IEEE Symposium on Security andPrivacy. 2001.
[4]. O. Dandash, Internet banking payment protocol with fraud
prevention, 2007 22nd International International Symposium
on Computer and Information Sciences.
[5]. YAHALOM, R.; Trust Relationships in Secure Systems-A
Distributed Authentication Perspective. Washington, DC 1993.
[6]. Data Hiding and Retrieval, A.Chakrabarti, Proceedings of IEEE
International conference on Computer Intelligence and
Computer Network held at Bhopal from 26-28 Nov, 2010.
[7]. Neal Koblitz ―A Course in Number Theory and Cryptography‖
Second Edition Published by Springer-Verlag.
[8]. T Morkel, JHP Eloff ― ENCRYPTION TECHNIQUES: A
TIMELINE APPROACH‖ published in Information and
Computer Security Architecture (ICSA) Research Group
proceeding.
[9]. By Klaus Felten ―An Algorithm for Symmetric Cryptography
with a wide range of scalability‖ published by 2nd International
Workshop on Embedded Systems and Industial IT.
[10].Vyshali Rao K P, Adesh N D , A V Srikantan, Client
Authorization and Secure Communication in Online Bank
Transactions
[11].Majdi Al-qdah & Lin Yi Hui―Simple Encryption/Decryption
Application in International Journal of Computer Science and
Security, Volume (1) : Issue (1).

More Related Content

What's hot (20)

PPT
Ch01
n C
 
PPTX
Digital signatures and e-Commerce
Naveen Jakhar, I.T.S
 
PDF
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
IJNSA Journal
 
PDF
IRJET- Data Security with Multifactor Authentication
IRJET Journal
 
PPTX
Cryptographic Security
jp tj
 
PPTX
Attack lecture #2 ppt
vasanthimuniasamy
 
PDF
Network security chapter 1
osama elfar
 
PDF
Security Analysis and Improvement for IEEE 802.11i
inventionjournals
 
PDF
Network security unit 1,2,3
WE-IT TUTORIALS
 
PPTX
Security in E-commerce
m8817
 
PPSX
Web security for e-commerce
Nishant Pahad
 
PDF
Introduction to Information Security
Dumindu Pahalawatta
 
PDF
IRJET- Password Management Kit for Secure Authentication
IRJET Journal
 
PPTX
Ppt.1
veeresh35
 
PPTX
Securing broker less publish subscribe systems using identity-based encryption
LeMeniz Infotech
 
DOCX
Securing broker less publish subscribe systems using identity-based encryption
Adz91 Digital Ads Pvt Ltd
 
DOCX
Securing broker less publish subscribe systems using identity-based encryption
Shakas Technologies
 
Ch01
n C
 
Digital signatures and e-Commerce
Naveen Jakhar, I.T.S
 
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
IJNSA Journal
 
IRJET- Data Security with Multifactor Authentication
IRJET Journal
 
Cryptographic Security
jp tj
 
Attack lecture #2 ppt
vasanthimuniasamy
 
Network security chapter 1
osama elfar
 
Security Analysis and Improvement for IEEE 802.11i
inventionjournals
 
Network security unit 1,2,3
WE-IT TUTORIALS
 
Security in E-commerce
m8817
 
Web security for e-commerce
Nishant Pahad
 
Introduction to Information Security
Dumindu Pahalawatta
 
IRJET- Password Management Kit for Secure Authentication
IRJET Journal
 
Ppt.1
veeresh35
 
Securing broker less publish subscribe systems using identity-based encryption
LeMeniz Infotech
 
Securing broker less publish subscribe systems using identity-based encryption
Adz91 Digital Ads Pvt Ltd
 
Securing broker less publish subscribe systems using identity-based encryption
Shakas Technologies
 

Viewers also liked (20)

PPTX
Slide show training_centre
Graco
 
PDF
Swedish Fashion Council.
ohadsan
 
PPTX
Final assignment
cynjac
 
PPTX
Jaringan Nirkabel
Ari Yandi
 
PPTX
Providing incentives
Joseph Grabel
 
PDF
Omnichannel cases
TESC-MBA
 
PDF
Transcript
Abdullah Al-momin
 
PDF
ONE HIDDEN LAYER ANFIS MODEL FOR OOS DEVELOPMENT EFFORT ESTIMATION
International Journal of Technical Research & Application
 
PPT
2015 опис досвіду обдаровані блог
OlgaVladychko
 
PDF
NEED OF THE HOUR: A CUSTOMER CENTRIC FORMAT FOR ORGANIZED RETAILING
International Journal of Technical Research & Application
 
PDF
COLOR FILTER ARRAY DEMOSAICING USING DIRECTIONAL COLOR DIFFERENCE AND GRADIEN...
International Journal of Technical Research & Application
 
PDF
GSM CONTROL OF ELECTRICAL APPLIANCES
International Journal of Technical Research & Application
 
PPT
Интернет в социологии – важнейшие информационные сайты. Южакова Эльмира, И-101
Elmira_Yuzhakova
 
PDF
CARP: AN IMAGE BASED SECURITY USING I-PAS
International Journal of Technical Research & Application
 
PDF
A COMPOSITION ON SOFTWARE TESTING
International Journal of Technical Research & Application
 
PDF
UNIVERSIDAD METROPOLITANA
Dario Fernando Verax Bravoz
 
PPT
19ст. тарас шевченко
OlgaVladychko
 
PDF
2012HAITI research report strengthening local capactities
Nathalie Reijer van Schagen
 
PDF
STRESS AND COPING STYLE OF URBAN AND RURAL ADOLESCENTS
International Journal of Technical Research & Application
 
Slide show training_centre
Graco
 
Swedish Fashion Council.
ohadsan
 
Final assignment
cynjac
 
Jaringan Nirkabel
Ari Yandi
 
Providing incentives
Joseph Grabel
 
Omnichannel cases
TESC-MBA
 
Transcript
Abdullah Al-momin
 
ONE HIDDEN LAYER ANFIS MODEL FOR OOS DEVELOPMENT EFFORT ESTIMATION
International Journal of Technical Research & Application
 
2015 опис досвіду обдаровані блог
OlgaVladychko
 
NEED OF THE HOUR: A CUSTOMER CENTRIC FORMAT FOR ORGANIZED RETAILING
International Journal of Technical Research & Application
 
COLOR FILTER ARRAY DEMOSAICING USING DIRECTIONAL COLOR DIFFERENCE AND GRADIEN...
International Journal of Technical Research & Application
 
GSM CONTROL OF ELECTRICAL APPLIANCES
International Journal of Technical Research & Application
 
Интернет в социологии – важнейшие информационные сайты. Южакова Эльмира, И-101
Elmira_Yuzhakova
 
CARP: AN IMAGE BASED SECURITY USING I-PAS
International Journal of Technical Research & Application
 
UNIVERSIDAD METROPOLITANA
Dario Fernando Verax Bravoz
 
19ст. тарас шевченко
OlgaVladychko
 
2012HAITI research report strengthening local capactities
Nathalie Reijer van Schagen
 
STRESS AND COPING STYLE OF URBAN AND RURAL ADOLESCENTS
International Journal of Technical Research & Application
 
Ad

Similar to IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING (20)

PPTX
Cyber Security Part-I.pptx
RavikumarVadana
 
PDF
A Review on Wireless Network Security.pdf
Rhonda Cetnar
 
PDF
A Review Study on Secure Authentication in Mobile System
Editor IJCATR
 
PDF
Cryptography and Network Security ppt . pdf
22cc005
 
PDF
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET Journal
 
DOCX
CCS354-NETWORK SECURITY-network-security notes
Kirubaburi R
 
PDF
Network Security
Beth Hall
 
PPTX
Network security by sandhya
sandeepsandy75
 
PDF
Efficient and Secure Single Sign on Mechanism for Distributed Network
IJERA Editor
 
PDF
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
IJCERT JOURNAL
 
PDF
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
IJNSA Journal
 
PPTX
Unit-1.pptx
ssuseref9c81
 
PPT
Securing E-Commerce Networks Presentation.ppt
anshikagoel52
 
PDF
Top 20 cyber security interview questions and answers in 2023.pdf
AnanthReddy38
 
PDF
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
IJNSA Journal
 
PDF
Target Unncryption Case Study
Evelyn Donaldson
 
PDF
Information Technology Security Is Vital For The Success...
Brianna Johnson
 
PPTX
I MSc CS CNS Day 1.pptx
Arumugam90
 
PPTX
mittre attack pattern notes for education.pptx
esaabren
 
PPT
Aspects of Network Security
SHUBHA CHATURVEDI
 
Cyber Security Part-I.pptx
RavikumarVadana
 
A Review on Wireless Network Security.pdf
Rhonda Cetnar
 
A Review Study on Secure Authentication in Mobile System
Editor IJCATR
 
Cryptography and Network Security ppt . pdf
22cc005
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET Journal
 
CCS354-NETWORK SECURITY-network-security notes
Kirubaburi R
 
Network Security
Beth Hall
 
Network security by sandhya
sandeepsandy75
 
Efficient and Secure Single Sign on Mechanism for Distributed Network
IJERA Editor
 
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
IJCERT JOURNAL
 
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
IJNSA Journal
 
Unit-1.pptx
ssuseref9c81
 
Securing E-Commerce Networks Presentation.ppt
anshikagoel52
 
Top 20 cyber security interview questions and answers in 2023.pdf
AnanthReddy38
 
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
IJNSA Journal
 
Target Unncryption Case Study
Evelyn Donaldson
 
Information Technology Security Is Vital For The Success...
Brianna Johnson
 
I MSc CS CNS Day 1.pptx
Arumugam90
 
mittre attack pattern notes for education.pptx
esaabren
 
Aspects of Network Security
SHUBHA CHATURVEDI
 
Ad

More from International Journal of Technical Research & Application (20)

PDF
STUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEW
International Journal of Technical Research & Application
 
PDF
EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...
International Journal of Technical Research & Application
 
PDF
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...
International Journal of Technical Research & Application
 
PDF
STUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONS
International Journal of Technical Research & Application
 
PDF
ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...
International Journal of Technical Research & Application
 
PDF
POD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTER
International Journal of Technical Research & Application
 
PDF
DIGITAL COMPRESSING OF A BPCM SIGNAL ACCORDING TO BARKER CODE USING FPGA
International Journal of Technical Research & Application
 
PDF
MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...
International Journal of Technical Research & Application
 
PDF
AN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIR
International Journal of Technical Research & Application
 
PDF
LI-ION BATTERY TESTING FROM MANUFACTURING TO OPERATION PROCESS
International Journal of Technical Research & Application
 
PDF
QUALITATIVE RISK ASSESSMENT AND MITIGATION MEASURES FOR REAL ESTATE PROJECTS ...
International Journal of Technical Research & Application
 
PDF
SCOPE OF REPLACING FINE AGGREGATE WITH COPPER SLAG IN CONCRETE- A REVIEW
International Journal of Technical Research & Application
 
PDF
EFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTY
International Journal of Technical Research & Application
 
PDF
EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...
International Journal of Technical Research & Application
 
PDF
THE CONSTRUCTION PROCEDURE AND ADVANTAGE OF THE RAIL CABLE-LIFTING CONSTRUCTI...
International Journal of Technical Research & Application
 
PDF
TIME EFFICIENT BAYLIS-HILLMAN REACTION ON STEROIDAL NUCLEUS OF WITHAFERIN-A T...
International Journal of Technical Research & Application
 
PDF
A STUDY ON THE FRESH PROPERTIES OF SCC WITH FLY ASH
International Journal of Technical Research & Application
 
PDF
AN INSIDE LOOK IN THE ELECTRICAL STRUCTURE OF THE BATTERY MANAGEMENT SYSTEM T...
International Journal of Technical Research & Application
 
PDF
OPEN LOOP ANALYSIS OF CASCADED HBRIDGE MULTILEVEL INVERTER USING PDPWM FOR PH...
International Journal of Technical Research & Application
 
PDF
PHYSICO-CHEMICAL AND BACTERIOLOGICAL ASSESSMENT OF RIVER MUDZIRA WATER IN MUB...
International Journal of Technical Research & Application
 
STUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEW
International Journal of Technical Research & Application
 
EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...
International Journal of Technical Research & Application
 
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...
International Journal of Technical Research & Application
 
STUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONS
International Journal of Technical Research & Application
 
ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...
International Journal of Technical Research & Application
 
POD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTER
International Journal of Technical Research & Application
 
DIGITAL COMPRESSING OF A BPCM SIGNAL ACCORDING TO BARKER CODE USING FPGA
International Journal of Technical Research & Application
 
MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...
International Journal of Technical Research & Application
 
AN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIR
International Journal of Technical Research & Application
 
LI-ION BATTERY TESTING FROM MANUFACTURING TO OPERATION PROCESS
International Journal of Technical Research & Application
 
QUALITATIVE RISK ASSESSMENT AND MITIGATION MEASURES FOR REAL ESTATE PROJECTS ...
International Journal of Technical Research & Application
 
SCOPE OF REPLACING FINE AGGREGATE WITH COPPER SLAG IN CONCRETE- A REVIEW
International Journal of Technical Research & Application
 
EFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTY
International Journal of Technical Research & Application
 
EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...
International Journal of Technical Research & Application
 
THE CONSTRUCTION PROCEDURE AND ADVANTAGE OF THE RAIL CABLE-LIFTING CONSTRUCTI...
International Journal of Technical Research & Application
 
TIME EFFICIENT BAYLIS-HILLMAN REACTION ON STEROIDAL NUCLEUS OF WITHAFERIN-A T...
International Journal of Technical Research & Application
 
A STUDY ON THE FRESH PROPERTIES OF SCC WITH FLY ASH
International Journal of Technical Research & Application
 
AN INSIDE LOOK IN THE ELECTRICAL STRUCTURE OF THE BATTERY MANAGEMENT SYSTEM T...
International Journal of Technical Research & Application
 
OPEN LOOP ANALYSIS OF CASCADED HBRIDGE MULTILEVEL INVERTER USING PDPWM FOR PH...
International Journal of Technical Research & Application
 
PHYSICO-CHEMICAL AND BACTERIOLOGICAL ASSESSMENT OF RIVER MUDZIRA WATER IN MUB...
International Journal of Technical Research & Application
 

Recently uploaded (20)

PDF
June 2025 Top 10 Sites -Electrical and Electronics Engineering: An Internatio...
elelijjournal653
 
PPTX
Comparison of Flexible and Rigid Pavements in Bangladesh
Arifur Rahman
 
PDF
A Brief Introduction About Robert Paul Hardee
Robert Paul Hardee
 
PPTX
Precooling and Refrigerated storage.pptx
ThongamSunita
 
PDF
Plant Control_EST_85520-01_en_AllChanges_20220127.pdf
DarshanaChathuranga4
 
PPTX
Computer network Computer network Computer network Computer network
Shrikant317689
 
PPTX
CM Function of the heart pp.pptxafsasdfddsf
drmaneharshalid
 
PDF
William Stallings - Foundations of Modern Networking_ SDN, NFV, QoE, IoT, and...
lavanya896395
 
PDF
Designing for Tomorrow – Architecture’s Role in the Sustainability Movement
BIM Services
 
PDF
FSE-Journal-First-Automated code editing with search-generate-modify.pdf
cl144
 
PDF
bs-en-12390-3 testing hardened concrete.pdf
ADVANCEDCONSTRUCTION
 
PDF
Decision support system in machine learning models for a face recognition-bas...
TELKOMNIKA JOURNAL
 
PPTX
Engineering Quiz ShowEngineering Quiz Show
CalvinLabial
 
PDF
MODULE-5 notes [BCG402-CG&V] PART-B.pdf
Alvas Institute of Engineering and technology, Moodabidri
 
PPTX
Functions in Python Programming Language
BeulahS2
 
PDF
Bayesian Learning - Naive Bayes Algorithm
Sharmila Chidaravalli
 
PDF
Module - 4 Machine Learning -22ISE62.pdf
Dr. Shivashankar
 
PDF
Authentication Devices in Fog-mobile Edge Computing Environments through a Wi...
ijujournal
 
PPTX
Kel.3_A_Review_on_Internet_of_Things_for_Defense_v3.pptx
Endang Saefullah
 
PDF
Clustering Algorithms - Kmeans,Min ALgorithm
Sharmila Chidaravalli
 
June 2025 Top 10 Sites -Electrical and Electronics Engineering: An Internatio...
elelijjournal653
 
Comparison of Flexible and Rigid Pavements in Bangladesh
Arifur Rahman
 
A Brief Introduction About Robert Paul Hardee
Robert Paul Hardee
 
Precooling and Refrigerated storage.pptx
ThongamSunita
 
Plant Control_EST_85520-01_en_AllChanges_20220127.pdf
DarshanaChathuranga4
 
Computer network Computer network Computer network Computer network
Shrikant317689
 
CM Function of the heart pp.pptxafsasdfddsf
drmaneharshalid
 
William Stallings - Foundations of Modern Networking_ SDN, NFV, QoE, IoT, and...
lavanya896395
 
Designing for Tomorrow – Architecture’s Role in the Sustainability Movement
BIM Services
 
FSE-Journal-First-Automated code editing with search-generate-modify.pdf
cl144
 
bs-en-12390-3 testing hardened concrete.pdf
ADVANCEDCONSTRUCTION
 
Decision support system in machine learning models for a face recognition-bas...
TELKOMNIKA JOURNAL
 
Engineering Quiz ShowEngineering Quiz Show
CalvinLabial
 
MODULE-5 notes [BCG402-CG&V] PART-B.pdf
Alvas Institute of Engineering and technology, Moodabidri
 
Functions in Python Programming Language
BeulahS2
 
Bayesian Learning - Naive Bayes Algorithm
Sharmila Chidaravalli
 
Module - 4 Machine Learning -22ISE62.pdf
Dr. Shivashankar
 
Authentication Devices in Fog-mobile Edge Computing Environments through a Wi...
ijujournal
 
Kel.3_A_Review_on_Internet_of_Things_for_Defense_v3.pptx
Endang Saefullah
 
Clustering Algorithms - Kmeans,Min ALgorithm
Sharmila Chidaravalli
 

IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING

  • 1. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 3, Issue 4 (July-August 2015), PP. 41-43 41 | P a g e IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING Kashif Ruman, Dr H.D. Phaneendra P.G Student: I.S.E Dept., Professor.,CS&E Dept., National Institute of Engineering, Mysore, India. [email protected], [email protected] ABSTRACT- Security is a concept similar to being cautious or alert against any danger. Network security is the condition of being protected against any danger or loss. Thus safety plays a important role in bank transactions where disclosure of any data results in big loss. We can define networking as the combination of two or more computers for the purpose of resource sharing. Resources here include files, database, emails etc. It is the protection of these resources from unauthorized users that brought the development of network security. It is a measure incorporated to protect data during their transmission and also to ensure the transmitted is protected and authentic. Security of online bank transactions here has been improved by increasing the number of bits while establishing the SSL connection as well as in RSA asymmetric key encryption along with SHA1 used for digital signature to authenticate the user. Keywords—Network Security, Digital signature, RSA, Security Attacks, Encryption, Certificate. I. INTRODUCTION Network can been defined as any set of interlinking lines resembling a network of roads parallel and interconnected system, also computer network can be simply defined as a system of interconnected computers. Security can be defined as the need to protect one or more aspects of network‘s operation and its permitted use for e.g. accessing, checking behavior, performance, having privacy and confidentiality. Network Security requirements can be Local or Global accordingly to their scope, depending upon the networks or purpose of design and deployment. The important aspect in judging security solutions include ability to meet the specified things, computing resources needed, quality, sustainability and economic considerations. Security Attacks compromises the data security. Active attacks can be defined as active attempts made to alter the data on security leading to modification, redirection, or destruction of data, systems or links. Another type of attack is Passive attacks which involve simply getting access to link of device and obtain data. Security threats can be defined as the threats that have the potential for violating security rules. Security Mechanism is a mechanism that detects/ locates/ identifies/prevents/ recovers from various security attacks. We should have a Security Service that improves security and makes use of the security mechanisms. The Internet is an integral part of our daily routines, and the proportion of people who expect to be able to manage their banking accounts anywhere, anytime is constantly increasing. So due to this enormous growth of online transactions Internet banking has become a very crucial and important component of any financial institution‘s strategy. Information about financial institutions, their users, and their fund transactions is, by necessity, extremely sensitive. So the Internet banking system should have provision to solve the issues related to authentication and non-repudiation, so that only authorized people can access an Internet banking account, and the information viewed must remain private and it should not be modified by others. For confidentiality and integrity, we have Secure Sockets Layer which has been defined as the defacto Internet banking standard, and for authentication and non- repudiation, no good scheme has become predominant yet. II. LITERATURE SURVEY Networking can be defined as the creating a group of acquaintances and associates and keeping it active through regular communication for mutual benefit. We can simply say that networking relies on the question "How can I help?" and not with "What can lI achieve from it?" .It provides the protection of the resources from unknown users, which brought the development of network security. It can be said as procedure put in place to protect data during their transmission and also to ensure the transmitted is protected and authentic. A threat can be defined in many ways such as gaining access to the network by an unauthorized party, to better understand the various types of threats to security; the definition of security requirement is inevitable. A. Cryptography and different Types of Security Algorithms Cryptography can be defined as science of writing in secret code. Between the contexts of any process to process communication, involves some of the specific security requirements like:  Authentication: It is the process of finding the identity of the user who is genuine and has access to resources.  Confidentiality: Ensuring that no other is able to access the data except the authorized user  Integrity: Assuring the reception that the message obtained has not been changed or tampered in any circumstances from the original.  Non-repudiation: A process to prove that the sender/receiver has really sent/received this message. There are several different ways of classifying cryptographic techniques. The algorithms can be majorly classified in 3 ways:  Secret Key Cryptography (SKC): In this type of algorithm it uses a common key for encryption and decryption at the sender and receiver end respectively.  Public Key Cryptography (PKC): In this type of algorithm it uses different key for encryption and another key for decryption at the sender and receiver end respectively.  Hash Functions: In this type of algorithm uses a mathematical transformation techniques to irreversibly "encrypt" the data.
  • 2. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 3, Issue 4 (July-August 2015), PP. 41-43 42 | P a g e B. Digital Signature Using RSA In the RSA algorithm for digital signature process, we have the private key that is used to encrypt only the plain text. Then encrypted message becomes the digital signature and is attached to the original data contained. C. Security Attacks Security attacks on network can be classified in terms of passive and active attacks. In case of passive attack it access the information from the system, but doesn‘t harm the information or resource in the system. An active attack on the other side will make changes in the system and diverts the ongoing operation. A passive attack is a network attack in which a system is monitored and sometimes scanned for open ports and vulnerabilities. The main aim is to gain information about the target and no data is changed on the target. An active attack, hacker is attempting to break into the system. During the attack, the intruder will introduce data into the system as well as potentially change data within the system. D. SHA (Secured Hash Algorithm) SHA the is cryptographic hash function. The different algorithms of SHA are SHA 0, SHA 1, SHA 2, and SHA 3. Here SHA-0 is the original version of the 160-bit hash function under the name "SHA", SHA-1 can be termed as, it is very much similar to SHA-0, but changes has been incorporated where it alters the original SHA hash specification to overcome its drawbacks, and SHA-2 was published in 2001, and this algorithm is very much different from the SHA-1 hash function. The most widely used algorithm is SHA-1 compared to all other existing SHA hash functions, and is employed in several widely used applications and protocols. III. SYSTEM REQUIREMENTS AND SPECIFICATION It provides a description of the various factors that affect the system and its requirements. A. System Perspective The secure system is aimed towards providing a service to users to trust servers before any request can made, and various methods have been implemented to detect fake servers and alert users about such systems and carry out communication in a secure manner. B. System Function The primary function of the system is to issue a certificate first to registered servers based on some credentials (like IP address, port number, kind of service being offered by server etc.) For obtaining this, the server has to interact with CA (Certificate Authority). Here the assumption is that CA is legitimate and fully trusted. User requests server for a certificate before trusting it and later verifies it for its authentication. In case of fake certificate detected, it is immediately reported to CA. C. Functional Requirements Functional requirements are those that refer to the functionality of the system. That is, what services it will provide to the client. Nonfunctional or supplementary requirements pertain to other information needed to produce the correct system and are detailed separately.  User has to request Server for Certificate and Public Key of CA after registration with server  User has to request Server for Certificate and Public Key of CA after registration with server.  User tries to detect whether Server or CA communicating with it is fake.  User communicates with Server or CA in highly secured manner.  Server provides a service to Users to do online secure transactions. IV. SYSTEM ANALYSIS The task of system analysis is to identify limitations of the existing system and to establish in detail what the proposed system will do. The main aim of the system analysis phase is the specification of what the system needs to do to meet the requirements of end users. A. Existing System The main aim of secure socket layer is to provide security between server and client, which includes the confidentiality that is the data should be kept secret, provide message integrity means the message should not be altered, and authentication where only authorized user have provision to access the data. SSL obtains these type of security by using encryption, digital signatures and certificates. The sensitive and confidential information such as pin number, social security numbers, and other important credentials are protected by using cryptography. Confidential data is encrypted with various different mechanisms across public networks to obtain the confidentiality if not an unauthorized user will able to obtain all the necessary data that is being sent between a server and a client they can see and use that information. Here the SSL protocol obtain the details of the encryption for network as it will be able to track where the data is being transmitted. The existing system uses SSL communication with 128 bits & RSA Encryption with 1024 bits maximum. Drawbacks of the existing system 1. Lesser the number of bits, more vulnerable to attack 2. Susceptible to collision attack B. Proposed System The project system architecture is shown below. Client interacts with server and gets required service. Certificate authority issues certificate to the server. The server‘s certificate will be later verified by the client before any transaction is being done and by the certificate authority upon requisition by the client. Features 1. SSL communication with 256 bits 2. RSA encryption with 2048 bits (this improvement in RSA provides more security to personal data) In this paper, as the result of analysis of existing system unique secret key extraction from the received request based on the inspiration of RSS in base paper is made possible. Once the key obtained is unique and different private communication secured for maximum by defeating the intention of the intruder in knowing the secret key.
  • 3. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 3, Issue 4 (July-August 2015), PP. 41-43 43 | P a g e V. SYSTEM DESIGN This gives overall flow of the project and algorithm used in the design.So in this phase Implementation can be said as a stage in software development where the software design is realized. The objects that are identified in the design stage are implemented, and a function which manipulates these objects is realized. A. Structure Chart Here the project is divided into three modules and sub- modules of each module are shown in the Fig 1. Fig 1 Structure chart Registration Module: User should be registered with the bank server and bank server should register with the Certificate Authority before requesting for any kind of service. Certificate Generation and Verification: User and Certificate Authority verifies the certificate (i.e. whether the that the given certificate is genuine or fake) Secure Transaction: Here we carry out the transaction that is secure communication between the entities. Delay & Fake IP: To detect whether Server / CA is legitimate or fake, detection of delay being introduced during transmission due to fake node(s) in the network. B. Sequence Diagram Fig 2.Sequence diagram As shown in the above fig 2, server first gets the certificate from the server. Client sends a hello packet to the server and server in turn sends the public key and certificate issued by CA. Client verifies certificate with the help of CA before trusting the server. When it is completely sure that server is not fake, client proceeds to carry out a transaction in a secure manner. VI. CONCLUSION AND FUTURE ENHANCEMENTS A. Conclusion In this paper we analyzed various security threats for computer networking, various loop holes of present networking. These threats overcame by various methodologies for securing the network through cryptography and encryption. Effort was made to find out the security aspect of Networking and it was overcome by means of Cryptography and Encryption by using improved RSA algorithm and also increased number of bits in SSL connection. Even though key generation time is more compared to that of present situation, security can be guaranteed which is more important than key generation time in the current scenario. B. Future Enhancements Presently, the system will support two rounds of certificate. In future it can be increased. The various types of attacks can be detected in future. Different methods can be adopted as a measure of security attack. Greater level of security can be provided by using multiple encryption, following multiple levels for an authentication or by strengthening the encryption key by increasing the number of bits. REFERENCES [1]. Christos K. Dimitriadis, ‖Analyzing the Security of Internet Banking Authentication Mechanisms‖2007 ISACA [2]. S.R. Subramanya and byung K. YI ‖Digital signatures‖, IEEE March/April 2006. [3]. Weeks, Stephen. Understanding Trust Management Systems. IEEE Symposium on Security andPrivacy. 2001. [4]. O. Dandash, Internet banking payment protocol with fraud prevention, 2007 22nd International International Symposium on Computer and Information Sciences. [5]. YAHALOM, R.; Trust Relationships in Secure Systems-A Distributed Authentication Perspective. Washington, DC 1993. [6]. Data Hiding and Retrieval, A.Chakrabarti, Proceedings of IEEE International conference on Computer Intelligence and Computer Network held at Bhopal from 26-28 Nov, 2010. [7]. Neal Koblitz ―A Course in Number Theory and Cryptography‖ Second Edition Published by Springer-Verlag. [8]. T Morkel, JHP Eloff ― ENCRYPTION TECHNIQUES: A TIMELINE APPROACH‖ published in Information and Computer Security Architecture (ICSA) Research Group proceeding. [9]. By Klaus Felten ―An Algorithm for Symmetric Cryptography with a wide range of scalability‖ published by 2nd International Workshop on Embedded Systems and Industial IT. [10].Vyshali Rao K P, Adesh N D , A V Srikantan, Client Authorization and Secure Communication in Online Bank Transactions [11].Majdi Al-qdah & Lin Yi Hui―Simple Encryption/Decryption Application in International Journal of Computer Science and Security, Volume (1) : Issue (1).